Et Cetera

Fri
22
Jan

Firewall Technologies and Securing a Network Classroom Lab

Contributed by Thomas S. Adeimy

The transition from industry into academia meant not having total access to computer hardware and software resources. I was going to teach computer and networking courses, and could not wait to use my real life industry experiences as learning tools in a classroom/lab setting. It wasn’t long until my newfound enthusiasm began to be tested. I was an instructor, not a member of the campus IT staff. All the campus labs were general purpose computer labs. Computer desktops were “locked down” by group policies, Internet access was restricted by “Cyber Patrol” controls, BIOS settings were password protected. Access to the “Server Room” was protected by a keypad, and of course I was not given the password. These were just some of the things that began to make my life miserable as a computer instructor.

Thu
14
Jan

Firewalls for small business

Contributed by James Thomas

A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try to prevent unwanted information from entering your network. This applies to a home, small business, or a large corporation network. A firewall monitors all of the incoming and outgoing traffic (information) to the local area network. Notice that the firewall is located between your network and the Internet.

This document is in PDF format. To view it click here.

Thu
14
Jan

Firewalls for the Home & Small Business

Contributed by Gordon Giles

A firewall can be in the form of hardware, software or a combination of the two. It is basically used to prevent, block, and keep out unwanted intruders from entering a network. This applies to a home, small business, or a large corporation network. A firewall monitors all of the incoming and outgoing traffic from a personal computer or a local area network. The majority of people ar enot afraid of the Internet connection being hacked by an outsider. The chances of suffering from some type of Internet hack are on the rise, especially when connected to the Internet using a cable modem or some type of broadband service.

This document is in PDF format. To view it click here.

Thu
14
Jan

Threat Detection Evolution: What Practitioners Need to Know

Contributed by Securosis

Prevention isn’t enough, whether you deploy it on the network or endpoints or both. It’s not clear that it ever was, but there is additional proof every day that adversaries cannot be reliably stopped. We see the beginning of the long-awaited shift of focus and funding, from prevention to detection and investigation. But security practitioners have been trying to make sense of security data for years to shorten the window between compromise and detection… largely unsuccessfully.

This document is in PDF format. To view it click here.

Fri
08
Jan

Using Digital Certificates to Identify Web Site Owners and Protect Against Phishing

Contributed by Edwin Aldridge

Phishing exploits the ordinary Internet user’s inability to be sure that a web site which they have been induced to visit is actually operated by the company or organization whose name appears on screen.

is deployed and used daily by every popular browser. Digital certificates can provide browsers with a reliable source of information about site owners which users can access via the padlock icon, although the information is not as useful as it might be and the padlock display is unintelligible.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera